EEL5806 Final P.1 with 100% correct answers 2023/2024
EEL5806 Final P.1All states look at port scanning as noninvasive or nondestructive in nature and deem it legal. - correct answer False As a security tester, you can make a network impenetrable. - correct answer False Old-Guard hackers brag incessantly about their successful exploits. - correct answer False The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats. - correct answer White Hat / Black Hat The GIAC program offers a certification that focuses on reverse-engineering malware. - correct answer True An ethical hacker is a person who performs most of the same activities a cracker does, but only late at night. - correct answer False "____" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world. - correct answer Gray Hat Using the W/B Hat model, which hacker is most likely to share information? - correct answer The SysAdmin, Audit, Network, Security (SANS) Institute offers training and IT security certifications through Global Information Assurance Certification (GIAC). - correct answer True If your web site is hacked and all the pages call up the same anti-war slogan and picture, which profile of hacker has hit your site? - correct answer ____ is an Internet tool that aids in retrieving domain name-specific information from the NSI Registrar database. - correct answer Newsgroups are part of an online bulletin board system called ____, which contains groups covering a huge variety of subjects. - correct answer The strongest link in any security scheme is the user. - correct answer False Internet footprinting is a technical method of reconnaissance, which interests budding hackers and network security specialists alike. - correct answer True With ____, a user is tricked into giving private information about his or her account with a known large organization. - correct answer phishing It is unsafe to dispose of printed drafts of letters in unsecured trash receptacles. - correct answer True Reconnaissance is not by definition illegal, and many reconnaissance techniques are completely legal - correct answer True Newspapers are useful tools for running exploits on target companies - correct answer True 71.81.18.32 is an example of an IPv6 address. - correct answer False Breaking CD-ROMs is sufficient to destroy their data, as data cannot be recovered from broken disks. - correct answer False The following entry is a valid nmap command syntax. nmap -P1 /home/nmap/file2 10.10.10.1-224 - correct answer False Is the following entry a valid nmap command syntax? nmap -A - correct answer No
Written for
- Institution
- GIAC certification
- Course
- GIAC certification
Document information
- Uploaded on
- December 14, 2023
- Number of pages
- 11
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal